A new botnet has been slowly growing over the past year by brute-forcing SSH logins and deploying cryptomining malware on Linux servers. The main bot client is based on the old Mirai worm whose source ...
Two separate Mirai botnet campaigns are exploiting a critical flaw in a somewhat unlikely target. The Akamai Security Intelligence and Response Team recently observed exploitation of CVE-2025-24016, a ...
Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code execution bug was disclosed ...
FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices ...
Researchers at cybersecurity software provider Qualys Inc. are warning of a new Mirai botnet variant that’s being used to target vulnerabilities in AVTECH Cameras and Huawei HG523 routers. The variant ...
A new Mirai-based botnetis actively exploiting a remote code execution vulnerability that has not received a tracker number and appears to be unpatched in DigiEver DS-2105 Pro NVRs. The campaign ...
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network’s Unit 42 team reports. Once ...
Former Mirai hackers have developed a new botnet, dubbed HinataBot, with the potential to cause far greater damage with far fewer resources required from its operators than its predecessor. Mirai is ...
Another botnet built on the foundations of the infamous Mirai has been recently spotted in the wild, but only briefly - suggesting it might be preparing for a major attack. Security researchers from ...
A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution (RCE) vulnerabilities to infect routers and video recorder (NVR) devices. The malware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results